Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
certified asterisk vulnerabilities and exploits
(subscribe to this query)
356
VMScore
CVE-2020-28242
An issue exists in Asterisk Open Source 13.x prior to 13.37.1, 16.x prior to 16.14.1, 17.x prior to 17.8.1, and 18.x prior to 18.0.1 and Certified Asterisk prior to 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk wil...
Asterisk Open Source
Asterisk Certified Asterisk
Fedoraproject Fedora 33
Debian Debian Linux 9.0
445
VMScore
CVE-2019-18976
An issue exists in res_pjsip_t38.c in Sangoma Asterisk up to and including 13.x and Certified Asterisk up to and including 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. Thi...
Digium Certified Asterisk 13.21
Digium Asterisk
Debian Debian Linux 9.0
445
VMScore
CVE-2016-9938
An issue exists in Asterisk Open Source 11.x prior to 11.25.1, 13.x prior to 13.13.1, and 14.x prior to 14.2.1 and Certified Asterisk 11.x prior to 11.6-cert16 and 13.x prior to 13.8-cert4. The chan_sip channel driver has a liberal definition for whitespace when attempting to str...
Digium Asterisk 11.0.0
Digium Asterisk 11.0.1
Digium Asterisk 11.10.0
Digium Asterisk 11.10.1
Digium Asterisk 11.14.1
Digium Asterisk 11.14.2
Digium Asterisk 11.19.0
Digium Asterisk 11.2.0
Digium Asterisk 11.21.1
Digium Asterisk 11.1.0
Digium Asterisk 11.12.0
Digium Asterisk 11.12.1
Digium Asterisk 11.16.0
Digium Asterisk 11.17.0
Digium Asterisk 11.2.1
Digium Asterisk 11.2.2
Digium Asterisk 11.23.0
Digium Asterisk 11.23.1
Digium Asterisk 11.5.1
Digium Asterisk 11.6.0
Digium Asterisk 13.0.0
Digium Asterisk 13.11.0
356
VMScore
CVE-2014-6610
Asterisk Open Source 11.x prior to 11.12.1 and 12.x prior to 12.5.1 and Certified Asterisk 11.6 prior to 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly han...
Digium Certified Asterisk 11.6.0
Digium Certified Asterisk 11.6
Digium Asterisk 12.5.0
Digium Asterisk 12.4.0
Digium Asterisk 12.0.0
Digium Asterisk 11.12.0
Digium Asterisk 11.11.0
Digium Asterisk 11.6.0
Digium Asterisk 11.5.0
Digium Asterisk 11.1.0
Digium Asterisk 11.0.0
Digium Asterisk 12.2.0
Digium Asterisk 11.9.0
Digium Asterisk 11.8.0
Digium Asterisk 11.4.0
Digium Asterisk 11.3.0
Digium Asterisk 12.3.0
Digium Asterisk 12.1.0
Digium Asterisk 11.10.0
Digium Asterisk 11.7.0
Digium Asterisk 11.2.0
571
VMScore
CVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potential...
Teluu Pjsip
Asterisk Certified Asterisk 16.8.0
Sangoma Asterisk
Debian Debian Linux 9.0
Debian Debian Linux 10.0
445
VMScore
CVE-2013-5641
The SIP channel driver (channels/chan_sip.c) in Asterisk Open Source 1.8.17.x up to and including 1.8.22.x, 1.8.23.x prior to 1.8.23.1, and 11.x prior to 11.5.1 and Certified Asterisk 1.8.15 prior to 1.8.15-cert3 and 11.2 prior to 11.2-cert2 allows remote malicious users to cause...
Digium Certified Asterisk 1.8.15
Digium Asterisk 11.4.0
Digium Asterisk 11.0.0
Digium Asterisk 11.1.0
Digium Asterisk 1.8.20.0
Digium Asterisk 1.8.17.0
Digium Asterisk 1.8.19.0
Digium Asterisk 1.8.19.1
Digium Certified Asterisk 11.2.0
Digium Asterisk 11.5.0
Digium Asterisk 11.0.1
Digium Asterisk 11.2.0
Digium Asterisk 1.8.23.0
Digium Asterisk 1.8.22.0
Digium Asterisk 1.8.18.0
Digium Asterisk 1.8.18.1
Digium Asterisk 11.3.0
Digium Asterisk 11.5.1
Digium Asterisk 11.0.2
Digium Asterisk 11.1.1
Digium Asterisk 11.1.2
Digium Asterisk 1.8.21.0
578
VMScore
CVE-2014-4046
Asterisk Open Source 11.x prior to 11.10.1 and 12.x prior to 12.3.1 and Certified Asterisk 11.6 prior to 11.6-cert3 allows remote authenticated Manager users to execute arbitrary shell commands via a MixMonitor action.
Digium Asterisk 11.9.0
Digium Asterisk 11.0.0
Digium Asterisk 11.1.2
Digium Asterisk 11.2.0
Digium Asterisk 11.4.0
Digium Asterisk 11.5.0
Digium Asterisk 11.8.0
Digium Asterisk 11.8.1
Digium Asterisk 11.0.1
Digium Asterisk 11.3.0
Digium Asterisk 11.1.0
Digium Asterisk 11.1.1
Digium Asterisk 11.10.0
Digium Asterisk 11.0.2
Digium Asterisk 11.5.1
Digium Asterisk 12.2.0
Digium Asterisk 12.0.0
Digium Asterisk 12.3.0
Digium Asterisk 12.1.0
Digium Asterisk 12.1.1
Digium Certified Asterisk 11.6
Digium Certified Asterisk 11.6.0
NA
CVE-2021-46837
res_pjsip_t38 in Sangoma Asterisk 16.x prior to 16.16.2, 17.x prior to 17.9.3, and 18.x prior to 18.2.2, and Certified Asterisk prior to 16.8-cert7, allows an malicious user to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by...
Asterisk Certified Asterisk 16.8.0
Digium Asterisk
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
445
VMScore
CVE-2021-32558
An issue exists in Sangoma Asterisk 13.x prior to 13.38.3, 16.x prior to 16.19.1, 17.x prior to 17.9.4, and 18.x prior to 18.5.1, and Certified Asterisk prior to 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur...
Digium Asterisk
Digium Certified Asterisk 16.8
Debian Debian Linux 9.0
Debian Debian Linux 11.0
801
VMScore
CVE-2019-18610
An issue exists in manager.c in Sangoma Asterisk up to and including 13.x, 16.x, 17.x and Certified Asterisk 13.21 up to and including 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AM...
Digium Certified Asterisk 13.21.0
Digium Asterisk
Debian Debian Linux 8.0
Debian Debian Linux 9.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »